O Level Online Exam
Menu mobile
Home
MCQ Topic Wise
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASICS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Online Mock Test
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASICS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Old Papers
Practical Questions
Videos
Projects
True/False Questions : OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY For NIELIT O Level Exam
OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY For NIELIT O Level Exam
00:00:00
English
Hindi
Question No# :
01
out of 20
Report Bug
Bookmark
Ripping is the process of copying data from CD to Hard disk.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
02
out of 20
Report Bug
Bookmark
Creating and distributing viruses and/or malicious code on other computers or posting confidential business information on the Internet are also part of cybercrime.
A.
TRUE
B.
FALSE
Question No# :
03
out of 20
Report Bug
Bookmark
Spamming refers to the use of electronic messaging systems to send unwanted bulk messages especially advertising, indiscriminately.
A.
TRUE
B.
FALSE
Question No# :
04
out of 20
Report Bug
Bookmark
Hacking a computer is always illegal and punishable by law.
कंप्यूटर को हैक करना हमेशा कानून द्वारा अवैध और दंडनीय है
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
05
out of 20
Report Bug
Bookmark
Attacks on confidentiality is not a type of cyber attacks
गोपनीयता पर हमला एक प्रकार का साइबर हमला नहीं है
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
06
out of 20
Report Bug
Bookmark
Backup your files regularly to prevent cyber security attacks
साइबर सुरक्षा हमलों को बचने के लिए नियमित रूप से अपनी फ़ाइलों का बैकअप लेना चहिये
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
07
out of 20
Report Bug
Bookmark
In the internet of things, information system can not be access remotely
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
08
out of 20
Report Bug
Bookmark
A firewall is a security device deployed at the boundary of corporate intranet to protect it from unauthorized access
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
09
out of 20
Report Bug
Bookmark
Mixed Reality Experience Combines Elements From Virtual Reality And Augmented Reality?
मिश्रित वास्तविकता, अनुभव आभासी वास्तविकता और संवर्धित वास्तविकता से तत्वों को जोडती है?
A.
TRUE
B.
FALSE
Question No# :
10
out of 20
Report Bug
Bookmark
Can I Make Money Through Blogging?
ब्लॉगिंग के माध्यम से पैसे कमाए जा सकते हैं?
A.
TRUE
B.
FALSE
Question No# :
11
out of 20
Report Bug
Bookmark
Robotics is also a major field related to Artificial intelligence
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
12
out of 20
Report Bug
Bookmark
Spware monitors user activity on internet and transmit that information in the background to someone else
Spware monitors user activity on internet and transmit that information in the background to someone else
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
13
out of 20
Report Bug
Bookmark
Firewall protects an organization’s computer systems from external access
फ़ायरवॉल किसी संगठन के कंप्यूटर सिस्टम को बाहरी पहुँच से बचाता है
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
14
out of 20
Report Bug
Bookmark
Denial of Service (DoS) attacks steal away login names and passwords, credit card/debit card numbers, files, or other confidential data.
A.
TRUE
B.
FALSE
Question No# :
15
out of 20
Report Bug
Bookmark
Bar Code and QR Code the same?
Bar Code and QR Code एक समान होते हैं ?
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
16
out of 20
Report Bug
Bookmark
Digital signatures develop two types of key one Private key and second Public key that are mathematically linked
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
17
out of 20
Report Bug
Bookmark
Flash memory is nonvolatile and often used in digital camera and cell phones
फ्लैश मेमोरी नॉन वोलेटाइल है और अक्सर डिजिटल कैमरा और सेल फोनमें उपयोग की जाती है?
A.
TRUE
B.
FALSE
Question No# :
18
out of 20
Report Bug
Bookmark
GSTIN service is the part of other services tab using Net banking?
GSTIN सेवा नेटबैंकिंग का उपयोग करके वाली अन्य सेवाओं के टैब का हिस्सा है?
A.
TRUE
B.
FALSE
Question No# :
19
out of 20
Report Bug
Bookmark
Phone security is the practice of defending mobile devices against a wide range of cyber attack.
Phone security is the practice of defending mobile devices against a wide range of cyber attack.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
20
out of 20
Report Bug
Bookmark
Copyrights are automatically associated with all written documents that contain original material.
A.
TRUE
TRUE
B.
FALSE
FALSE
Latest Current Affairs 2026
Online Exam Quiz for One day Exam
Online Typing Test
CCC Online Test
Python Programming Tutorials
Best Computer Training Institute in Prayagraj (Allahabad)
Online MBA 2 years
Online MCA
Online BCA
Best Website and Software Company in Allahabad